At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices

  title={At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices},
  author={Zaire Ali and J. Payton and Vincent Sritapan},
  journal={2016 IEEE Security and Privacy Workshops (SPW)},
  • Zaire Ali, J. Payton, Vincent Sritapan
  • Published 2016
  • Computer Science
  • 2016 IEEE Security and Privacy Workshops (SPW)
  • Currently, the most prevalent approaches to authenticate smartphones involve either PINs, swipe patterns, or passwords. Few users enable these approaches. In order to encourage adoption, new authentication methods are needed. Emerging methods rely on the distinctness of a user's touch-based gesture for continuous authentication, providing an unobtrusive approach that simply monitors swipes and other input gestures as they are performed in the context of everyday smartphone use. However… CONTINUE READING
    12 Citations

    Figures and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    Authentication analysis using input gestures in touch-based mobile devices
    • 3
    Continuous Authentication of Smartphone Users via Swipes and Taps Analysis
    DTW-KNN Implementation for Touch-based Authentication System
    • Renzhong Wang, Dan Tao
    • Computer Science
    • 2019 5th International Conference on Big Data Computing and Communications (BIGCOM)
    • 2019
    Affective states recognition through touch dynamics
    • 1
    Compound Password System for Mobile
    Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review
    • 21


    Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
    • 588
    • PDF
    Biometric-rich gestures: a novel approach to authentication on multi-touch devices
    • 277
    • PDF
    TIPS: context-aware implicit user identification using touch screen in uncontrolled environments
    • 97
    • PDF
    Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones
    • 145
    • Highly Influential
    Unobservable Re-authentication for Smartphones
    • 188
    • PDF
    Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking
    • 37
    • PDF
    Wireless cracking: there's an app for that
    • S. Gold
    • Computer Science
    • Netw. Secur.
    • 2012
    • 1
    A simple text-based shoulder surfing resistant graphical password scheme
    • 35
    • PDF
    U.S. Smartphone Use in 2015
    • 446
    The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords
    • J. Bonneau
    • Computer Science
    • 2012 IEEE Symposium on Security and Privacy
    • 2012
    • 603
    • PDF